You may reprint or publish this article free of charge as long as
bylines are included.Original URL (The Web version of
article) --------------------------------------------- http://www.defendingthenet.com/NewsLetters/YAWNA–YetAnother WirelessNetworking
Article.htm
Title ----- YAWNA - Yet Another Wireless Networking Article Wireless Network Security ------------------------------------------------------ The consumer-level wireless networking market has exploded over
past few years. Unfortunately, manufacturers have been lax in explaining
potential security risks associated with their products. Typical instructions bundled with consumer products are geared towards getting you up and running as quickly as possible. Only recently has consumer equipment begun shipping with basic security measures enabled. Unfortunately, this effort is flawed by
fact that all devices typically ship with
same default configurations, making
effort wasted.
Do People Really Care About Wireless Security -------------------------- While there are hundreds, if not thousands, of articles currently available on how to secure a wireless home network, they frequently address only
steps involved, ignoring
reasoning behind them. Of course
most obvious reason is to protect
data on your own network. Believe it or not, many people don’t see this as enough incentive. One of my own family members (who has an IT background, no less) once expressed to me that
security of his network wasn’t of concern because he knew his individual machines were safe. He was right with regards to his systems; they were pretty secure. However, his belief that someone intruding on his network was there for his stuff was flawed.
Using Your Wireless Network For Fun & Profit ----------------------------------- Your bandwidth alone is a significant motivator for
less than scrupulous. Your unsecured wireless network can provide
ultimate “anonymizer” for illicit activities. You may be facilitating a glorious “hacker” techno-battle, such as those portrayed in
movies and television. Perhaps an international spy needs to transmit secret data back to her superiors and decides to borrow your network to fulfill
task. While not likely, you never know. Little Johnny Wants A New Toy ---------------------------------------------- Here’s a more realistic scenario:
Little Johnny has a stolen credit card number. We don’t know how he got it, it doesn’t really matter. What does matter is that Johnny now wants to take advantage of his prize and knows exactly how. His reward will be one of those new handheld video games that are flying off
shelves. Johnny isn’t foolish enough to walk into a store and use his stolen credit card, he knows a better way. Johnny lives across
street from you and your unsecured wireless network